Описание
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A user without script/programming right can trick a user with elevated rights to edit a content with a malicious payload using a WYSIWYG editor. The user with elevated rights is not warned beforehand that they are going to edit possibly dangerous content. The payload is executed at edit time. This vulnerability has been patched in XWiki 15.10RC1.
Ссылки
- Vendor Advisory
- Issue TrackingVendor Advisory
- Issue TrackingVendor Advisory
- Issue TrackingVendor Advisory
- Issue TrackingVendor Advisory
- Issue TrackingVendor Advisory
- Issue TrackingVendor Advisory
- Issue TrackingVendor Advisory
- Issue TrackingVendor Advisory
- Issue TrackingVendor Advisory
- Issue TrackingVendor Advisory
- Issue TrackingVendor Advisory
- Issue TrackingVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 15.9 (включая)
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
EPSS
Процентиль: 81%
0.0146
Низкий
9 Critical
CVSS3
8 High
CVSS3
Дефекты
CWE-269
CWE-862
Связанные уязвимости
CVSS3: 9
github
больше 1 года назад
In XWiki Platform, payloads stored in content is executed when a user with script/programming right edit them
EPSS
Процентиль: 81%
0.0146
Низкий
9 Critical
CVSS3
8 High
CVSS3
Дефекты
CWE-269
CWE-862